防止在分析使用我的 .net 程序集的应用程序时泄露太多信息
我创建了一个 .Net 程序集,当通过像 jetbrains dottrace 这样的分析器运行使用我的程序集的应用程序时,会泄露有关我的程序集的大量信息(私有方法等..)(尽管没有源代码)。有什么办法可以防止这种情况发生吗?
I have created a .Net assembly and when running an application that uses my assembly through a profiler like jetbrains dottrace, a lot of information is being revealed about my assembly (private methods etc..) (no source code though). Is there anyway to prevent that ?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(5)
我不明白这一点。鉴于您的代码的客户端正在运行分析器。这不是自愿行为,他们这样做是因为他们遇到了问题。您更喜欢什么样的反馈?选择以下一项:
I don't get this. Given is that the client of your code is running a profiler. That's not a voluntary act, they do this because they got a problem. What kind of feedback do you prefer? Choose one of:
您是否尝试过混淆?深受本地人欢迎的一个是 Dotfuscator。
have you tried obfuscating? One popular with the natives is Dotfuscator.
应该注意的是,即使是混淆器也无法阻止 dll 的逆向操作。这只会让事情变得更加困难。如果您的 DLL 包含敏感信息,您可能应该考虑在 DLL 之外的另一个文件中对其进行加密(尽管这也不是一个完美的解决方案)。
如果某人拥有机器上的调试权限,他们几乎可以看到正在运行的程序集,以及拦截甚至修改它正在使用的数据。
您对此感到担忧有什么具体原因吗?或者这只是一个普遍的担忧?
It should be noted that even an obfuscator will not prevent reversing of the dll. It will only make it more difficult. If your DLL contains sensitive information you should probably consider encrypting it outside of the dll in another file (though even this is not a perfect solution).
If someone has debug rights on a machine they can pretty much see your assembly in action, as well as intercept and even modify the data it is using.
Is there a specific reason why this concerns you? or is it just a general concern?
Visual Studio 附带了 Dotfuscator 的免费版本。看看那个。
-奥辛
A free edtion of Dotfuscator comes with Visual Studio. Take a look at that.
-Oisin
可以调试代码的人可能会使用 等反射工具看到的不仅仅是方法名称。 NET 反射器。如果这是一个问题,您可能需要混淆一些代码。有许多免费和商业选项。
Chances are someone who can debug your code can see more than just method names with a reflection tool like .NET Reflector. If this is a problem, you may want to obfuscate some of your code. There are a number free and commercial options.